Home

The Journal of Integrated Security Science (JISS) is aimed at publishing innovative scholarly manuscripts that make a significant contribution – theoretically or empirically – to all areas of physical security.

Of particular interest are articles that combine science, technology, and regulations to invent sophisticated yet practical solutions for securing assets in the various domains including: chemical and process industry, oil and gas industry, transportation systems including HAZMAT transportation, power plants (nuclear, LNG, etc.), pipelines, drinking water and water treatment systems, dams, commercial facilities, and government facilities.

Current Issue

Vol 2 No 1 (2018)

Vol 2 No 1 (2018)

Articles

Allocation of resources to improve security is crucial when we consider people’s safety on transport systems. We show how a system engineering methodology can be used to link business intelligence and railway specifics toward better value for money. A model is proposed to determine a probability of a success in service management. The forecasting model is a basic Markov Chain. A use case demonstrates a way to align statistical data (crime on stations) and probability of investment into resources (people, security measures, time).

Allocation of resources to improve security is crucial when we consider people’s safety on transport systems. We show how a system engineering methodology can be used to link business intelligence and railway specifics toward better value for money. A model is proposed to determine a probability of a success in service management. The forecasting model is a basic Markov Chain. A use case demonstrates a way to align statistical data (crime on stations) and probability of investment into resources (people, security measures, time).

Allocation of resources to improve security is crucial when we consider people’s safety on transport systems. We show how a system engineering methodology can be used to link business intelligence and railway specifics toward better value for money. A model is proposed to determine a...

Why should game theory be introduced and used in the chemical security practitioners?Security risks are initiated by deliberate behaviours for certain goals. For instance, thievesintentionally intrude a plant for stealing valuable materials, or terrorists maliciously set a fire on achemical facility to cause societal fear. Initiators of security events (henceforth, attackers) wouldintelligently observe the defender’s defence plan and then schedule their attack accordingly.Powell (2007) illustrated how resources can be mis-allocated if intelligent interactions between thedefender and the attacker are not considered. Game theory was invented in the economic domainfor modelling both the cooperative and competitive behaviours in a multiple actors system. In thelast 100 years, game theory has been theoretically improved and practically applied to variousdomains, such as the evolutionary biology, the nuclear balance, computer science etc. Theseresearches have demonstrated the capability of game theory in modelling intelligent interactions.Industrial managers need quantitative recommendations to support their decision making.Conventional security risk assessment methodologies (e.g., the API SRA framework (API, 2013)),being good at studying security systematically, are not able to provide quantitative insights.

Moreover, results of these conventional methodologies are not repeatable which means thatapplying the same methodology to the same plant, different analysts may come to differentconclusions. Some quantitative security risk assessment models, for instance, by employing aBayesian Network framework (e.g., Argenti et al. (2018); Landucci et al. (2017); Fakhravar et al.(2017)), can provide quantitative and repeatable results as well. Nevertheless, these models fail onmodelling the intelligent interactions between the defender and the attacker. Game theory,conversely, has a rigorous mathematical foundation and models the intelligent interactions. Agame theoretic model explicitly indicates 1) who is involved in the game; 2) what actions can eachparticipant take; 3) what results (numbers) will each participant obtain, for each participants’strategy combination; 4) how much information that each participant has about the game.Furthermore, outputs of a game theoretic model (i.e., equilibrium) clearly and quantitativelyindicates what should the participants do (i.e., the equilibrium strategy) and what will eachparticipant obtain (i.e., the equilibrium payoff).A critical issue is that industrial managers often prefer a qualitative approach and they havedifficulties on understanding (the physical meaning of) the quantitative outputs of a gametheoretical model. This issue can be addressed by requiring game developers to do a further stepwork by also translating/mapping their quantitative outputs to qualitative descriptions, and thelatter should be expressed in terminologies that industrial practitioners are familiar with. Figure 1illustrates the idea.

Why should game theory be introduced and used in the chemical security practitioners?Security risks are initiated by deliberate behaviours for certain goals. For instance, thievesintentionally intrude a plant for stealing valuable materials, or terrorists maliciously set a fire on achemical facility to cause societal fear. Initiators of security events (henceforth, attackers) wouldintelligently observe the defender’s defence plan and then schedule their attack accordingly.Powell (2007) illustrated how resources can be mis-allocated if intelligent interactions between thedefender and the attacker are not considered. Game theory was invented in the economic domainfor modelling both the cooperative and competitive behaviours in a multiple actors system. In thelast 100 years, game theory has been theoretically improved and practically applied to variousdomains, such as the evolutionary biology, the nuclear balance, computer science etc....

Why should game theory be introduced and used in the chemical security practitioners?Security risks are initiated by deliberate behaviours for certain goals. For instance, thievesintentionally intrude a plant for stealing valuable materials, or terrorists maliciously set a fire on...

A conceptual framework for physical security culture in organisations is proposed, based on the integrative model of safety culture, as developed by Vierendeels et al. (2018). The proposed conceptual framework for physical security culture has the advantage that it brings security threats, technique, organisation and human aspects together in a coherent, integrative and related way. The framework includes five main domains of security culture, being (a) an observable technological domain, (b) an observable organisational domain, (c) an observable human domain, (d) a non-observable organisational domain or perceptual domain, and (e) a non-observable human domain or psychological domain. These five main domains can be further divided into several more specific sub-domains of security culture. At their turn, these sub-domains can be translated into measurable security results, being (a) observable security outcomes, (b) the security climate of an organisation or the shared perceptions on security, and (c) the individual intention to behave secure or insecure. The aim of the framework is to take all security-related aspects into account – based on the specific security threats to which an organisation is exposed – leading to a pro-active approach of the physical security of organisations. The framework provides specific points of departure to make the security culture measurable, and by extension controllable.

A conceptual framework for physical security culture in organisations is proposed, based on the integrative model of safety culture, as developed by Vierendeels et al. (2018). The proposed conceptual framework for physical security culture has the advantage that it brings security threats, technique, organisation and human aspects together in a coherent, integrative and related way. The framework includes five main domains of security culture, being (a) an observable technological domain, (b) an observable organisational domain, (c) an observable human domain, (d) a non-observable organisational domain or perceptual domain, and (e) a non-observable human domain or psychological domain. These five main domains can be further divided into several more specific sub-domains of security culture. At their turn, these sub-domains can be translated into measurable security results, being (a) observable security outcomes, (b) the security climate of an organisation or the shared...

A conceptual framework for physical security culture in organisations is proposed, based on the integrative model of safety culture, as developed by Vierendeels et al. (2018). The proposed conceptual framework for physical security culture has the advantage that it brings security threats,...

The Journal of Integrated Security Science (JISS) is aimed at publishing innovative scholarly manuscripts that make a significant contribution – theoretically or empirically – to all areas of physical security.

Of particular interest are articles that combine science, technology, and regulations to invent sophisticated yet practical solutions for securing assets in the various domains including: chemical and process industry, oil and gas industry, transportation systems including HAZMAT transportation, power plants (nuclear, LNG, etc.), pipelines, drinking water and water treatment systems, dams, commercial facilities, and government facilities.